<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FWSM InterContext Connection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055338#M895213</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I already have the default route and access list on both context set to allow the traffic from 10.10.10.10 host to the internet. The routing on the MSFC was also set. I am not sure but I think I am having problem with the translation of the local IP into the global IP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 12 Oct 2008 02:44:48 GMT</pubDate>
    <dc:creator>griever060684</dc:creator>
    <dc:date>2008-10-12T02:44:48Z</dc:date>
    <item>
      <title>FWSM InterContext Connection</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055334#M895208</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is my first time to inquire on the Cisco NetPro Forums.&lt;/P&gt;&lt;P&gt;ï&amp;#129;&amp;#138;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am currently having a problem with one of my set-up in our production environment. Let me first start by describing the set-up of the network infrastructure. I have a two context firewall deployed on our Edge Router Cisco 7609. One context is deployed to cater the DMZ requirement of our network and the other context is allocated to filter incoming traffic from the internet. (Please see attached Powerpoint Document)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A server from the DMZ needs to be accessed from the internet and vice versa. The local address of this server is being translated into a public IP on the firewall context that is catered to filter WWW traffic (WWW Firewall Context). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Problem is that I am unable to successfully connect to the internet using this set-up. I have checked the routing and have verified that I have a complete path going to the vlan interface of WWWFirewall Context. However I am not able to see any traffic hitting my WWWFirewall Context coming from my local address (10.10.10.10).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:56:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055334#M895208</guid>
      <dc:creator>griever060684</dc:creator>
      <dc:date>2019-03-11T13:56:20Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM InterContext Connection</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055335#M895209</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there a route on the WWW FW Context and the MSFC for the 10.10.10.10 host?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you ping 10.10.10.10 from the WWW FW Context?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 11 Oct 2008 10:17:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055335#M895209</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-10-11T10:17:45Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM InterContext Connection</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055336#M895210</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;first u need to have a permite ACL becuase fwsm deny all traffic on all interfaces by defualt&lt;/P&gt;&lt;P&gt;then u need static route on wwwFW to the 10.10.10.10 through MSFC&lt;/P&gt;&lt;P&gt;ip route vlan200 10.10.10.10 255.255.255.255 10.10.2.50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the dmz firewall u need to have the permit ACL on both interfaces as well as mentioned Above fwsm deny all bydefault&lt;/P&gt;&lt;P&gt;the u need route like&lt;/P&gt;&lt;P&gt;ip route vlan220 0.0.0.0 0.0.0.0 10.10.2.49&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on MSFC&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 10.10.2.43&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 11 Oct 2008 13:45:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055336#M895210</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-10-11T13:45:33Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM InterContext Connection</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055337#M895211</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes I can reach the server 10.10.10.10 from the WWWFW context. I can also ping the FW contex from the 10.10.10.10 host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe that the routing is not an issue anymore since I have set the default routes on th DMZFW context pointing to the MFSC, and the MSFC by default is routing going to the WWWFW Context.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the WWWFW context, I have 10.10.10.0/24 route pointing to the MSFC (10.10.2.33) and an entry in the MSFC for pointing 10.10.10.0/24 to the DMZFW context.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Might there be an issue on my natting on the WWWFW Context? Because right now, I am mapping 10.10.10.10 to 200.200.30.5. exact entry is &lt;/P&gt;&lt;P&gt;static (VLAN200,VLAN1888) 200.200.30.5 10.10.10.10 netmask 255.255.255.255&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 Oct 2008 02:42:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055337#M895211</guid>
      <dc:creator>griever060684</dc:creator>
      <dc:date>2008-10-12T02:42:32Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM InterContext Connection</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055338#M895213</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I already have the default route and access list on both context set to allow the traffic from 10.10.10.10 host to the internet. The routing on the MSFC was also set. I am not sure but I think I am having problem with the translation of the local IP into the global IP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 Oct 2008 02:44:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055338#M895213</guid>
      <dc:creator>griever060684</dc:creator>
      <dc:date>2008-10-12T02:44:48Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM InterContext Connection</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055339#M895215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;can please, confirm that you have the proper permit ACL on both direction i mean in each context u need to have a permit on the inside and outside for the required traffic !!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 Oct 2008 02:45:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055339#M895215</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-10-12T02:45:43Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM InterContext Connection</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055340#M895217</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Marwanshawi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes I have already placed an acl on both the inbound and outbound direction. I hawever am not getting any hits on the firewall that would translate my local IP to a public IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 Oct 2008 03:06:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055340#M895217</guid>
      <dc:creator>griever060684</dc:creator>
      <dc:date>2008-10-12T03:06:50Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM InterContext Connection</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055341#M895219</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok now after u made sure the nating, routing and ACLs configured corectly&lt;/P&gt;&lt;P&gt;RELOAD the FWSM&lt;/P&gt;&lt;P&gt;then try to check out the nating after that&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 Oct 2008 03:08:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055341#M895219</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-10-12T03:08:33Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM InterContext Connection</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055342#M895221</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can verify the NAT/connnections by &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show conn det | inc 10.10.10.10&lt;/P&gt;&lt;P&gt;show xlate det | inc 10.10.10.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only thing having a higher preference than a static would be a nat (x) 0 ACL, incase you have one those on any context?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 Oct 2008 04:55:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055342#M895221</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-10-12T04:55:17Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM InterContext Connection</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055343#M895223</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, I'll look into that during the troubleshooting window. Another question, since the static translation I configured on my firewall applies to vlan200 going to vlan1888, do I still need to configure another static translation this time for the interface vlan1888 going to int vlan200? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 Oct 2008 08:45:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055343#M895223</guid>
      <dc:creator>griever060684</dc:creator>
      <dc:date>2008-10-12T08:45:35Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM InterContext Connection</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055344#M895225</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;u dont need to make the translation twice&lt;/P&gt;&lt;P&gt;once the destination translated to 10.10.10.10&lt;/P&gt;&lt;P&gt;then it will be sent internally to that address when get back to the  outside will be retrnaslted to the outside address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 Oct 2008 08:50:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055344#M895225</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-10-12T08:50:14Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM InterContext Connection</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055345#M895227</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes as Marwan said, static translations are bi-directional. so no need for two statements, in fact the second statement would mean something totally opposite. Similarly "nat (intf) 0 access-list ... "  is also bi-directional (NAT exemption). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regular Dynamic NAT [Nat/Global] and Identity NAT [nat (intf)0 ip mask] are uni-directional only tough.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 Oct 2008 09:45:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055345#M895227</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-10-12T09:45:40Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM InterContext Connection</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055346#M895229</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi guys thank you for your help. The issue was already resolved. We just had a problem with the natting of the IP. thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Oct 2008 05:34:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-intercontext-connection/m-p/1055346#M895229</guid>
      <dc:creator>griever060684</dc:creator>
      <dc:date>2008-10-13T05:34:37Z</dc:date>
    </item>
  </channel>
</rss>

